Edge computing security: State of the art and challenges Y Xiao, Y Jia, C Liu, X Cheng, J Yu, W Lv Proceedings of the IEEE 107 (8), 1608-1631, 2019 | 226 | 2019 |
NormaChain: A blockchain-based normalized autonomous transaction settlement system for IoT-based E-commerce C Liu, Y Xiao, V Javangula, Q Hu, S Wang, X Cheng IEEE Internet of Things Journal 6 (3), 4680-4693, 2018 | 69 | 2018 |
A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT Y Jia, Y Xiao, J Yu, X Cheng, Z Liang, Z Wan IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1493-1501, 2018 | 44 | 2018 |
BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT S Liu, J Yu, Y Xiao, Z Wan, S Wang, B Yan IEEE Internet of Things Journal 7 (9), 7851-7867, 2020 | 26 | 2020 |
I can see your brain: Investigating home-use electroencephalography system security Y Xiao, Y Jia, X Cheng, J Yu, Z Liang, Z Tian IEEE Internet of Things Journal 6 (4), 6681-6691, 2019 | 22 | 2019 |
Image and attribute based convolutional neural network inference attacks in social networks B Mei, Y Xiao, R Li, H Li, X Cheng, Y Sun IEEE Transactions on Network Science and Engineering 7 (2), 869-879, 2018 | 22 | 2018 |
Detecting malicious behaviors in javascript applications J Mao, J Bian, G Bai, R Wang, Y Chen, Y Xiao, Z Liang IEEE Access 6, 12284-12294, 2018 | 22 | 2018 |
LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT J Yu, S Liu, S Wang, Y Xiao, B Yan IEEE Internet of Things Journal 7 (9), 7949-7966, 2020 | 17 | 2020 |
Queuing without patience: A novel transaction selection mechanism in blockchain for iot enhancement H Shi, S Wang, Y Xiao IEEE Internet of Things Journal 7 (9), 7941-7948, 2020 | 12 | 2020 |
HomeShield: a credential-less authentication framework for smart home systems Y Xiao, Y Jia, C Liu, A Alrawais, M Rekik, Z Shan IEEE Internet of Things Journal 7 (9), 7903-7918, 2020 | 10 | 2020 |
Tokoin: a coin-based accountable access control scheme for Internet of Things C Liu, M Xu, H Guo, X Cheng, Y Xiao, D Yu, B Gong, A Yerukhimovich, ... arXiv preprint arXiv:2011.04919, 2020 | 9 | 2020 |
Design of cloud computing task offloading algorithm based on dynamic multi-objective evolution S Hu, Y Xiao Future Generation Computer Systems 122, 144-148, 2021 | 8 | 2021 |
Inference attacks based on neural networks in social networks B Mei, Y Xiao, H Li, X Cheng, Y Sun Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and …, 2017 | 6 | 2017 |
Privilege leakage and information stealing through the android task mechanism Y Xiao, G Bai, J Mao, Z Liang, W Cheng 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 152-163, 2017 | 6 | 2017 |
Cryptographic algorithms for privacy-preserving online applications R Li, Y Xiao, C Zhang, T Song, C Hu Mathematical Foundations of Computing 1 (4), 311, 2018 | 5 | 2018 |
Correlated participation decision making for federated edge learning Q Hu, F Li, X Zou, Y Xiao GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020 | 4 | 2020 |
A correlated equilibrium based transaction pricing mechanism in blockchain Q Hu, Y Nigam, Z Wang, Y Wang, Y Xiao 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-7, 2020 | 3 | 2020 |
A function-level behavior model for anomalous behavior detection in hybrid mobile applications J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang 2016 International Conference on Identification, Information and Knowledge …, 2016 | 2 | 2016 |
I know your social network accounts: A novel attack architecture for device-identity association Y Xiao, Y Jia, X Cheng, S Wang, J Mao, Z Liang IEEE Transactions on Dependable and Secure Computing, 2022 | 1 | 2022 |
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems Y Xiao, Y Jia, Q Hu, X Cheng, B Gong, J Yu IEEE Transactions on Dependable and Secure Computing, 2022 | | 2022 |